Challenges, Collaborative Interactions, and Diagnosis Performed by IT Security Practitioners: An Empirical Study
/ Rodrigo Werlinger [LERSSE-THESIS-2008-004]This thesis investigates four different aspects of information security management: challenges faced by security practitioners, interactive collaborations among security practitioners and other stakeholders, diagnostic work performed by security practitioners during the response to incidents, and factors that impact the adoption of an intrusion detection system in one organization. [...] Published in Rodrigo Werlinger, "Challenges, Collaborative Interactions, and Diagnosis Performed by IT Security Practitioners: An Empirical Study," MASc thesis, Department of Electrical and Computer Engineering, University of British Columbia, Vancouver, Canada, July 2008. : Transfer from CDS 0.99.7:PDF;

Proceedings of the Second EECE 512 Mini-Conference on Computer Security
/ Brett Cannon ; Jeremy Hilliker ; Maryam Najafian Razavi ; Rodrigo Werlinger [LERSSE-REPORT-2007-022]The proceedings of the second mini-conference of the EECE 512 course on Topics in Computer Security include four papers: 1. [...] Published in Brett Cannon and Jeremy Hilliker and Maryam Najafian Razavi and Rodrigo Werlinger, "Proceedings of the Second EECE 512 Mini-Conference on Computer Security", Sponsored by Laboratory for Education and Research in Secure Systems Engineering, University of British Columbia, Number: LERSSE-TR-2007-03, 2007, http://lersse-dl.ece.ubc.ca: Transfer from CDS 0.99.7:PDF;

On the Benefits of Decomposing Policy Engines into Components
/ Konstantin Beznosov [TEST-ARTICLE-2005-004]In order for middleware systems to be adaptive, their properties and services need to support a wide variety of application-specific policies. [...] Published in Konstantin Beznosov. Flooding and recycling authorizations. In Proceedings of the New
Security Paradigms Workshop (NSPW’05), pages 67–72, Lake Arrowhead, CA, USA, 20-23
September 2005. ACM Press.
: Transfer from CDS 0.99.7:PDF;